US20180364955A1 - Print service management apparatus, print service system, and non-transitory computer readable medium - Google Patents
Print service management apparatus, print service system, and non-transitory computer readable medium Download PDFInfo
- Publication number
- US20180364955A1 US20180364955A1 US15/996,012 US201815996012A US2018364955A1 US 20180364955 A1 US20180364955 A1 US 20180364955A1 US 201815996012 A US201815996012 A US 201815996012A US 2018364955 A1 US2018364955 A1 US 2018364955A1
- Authority
- US
- United States
- Prior art keywords
- file
- print service
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1203—Improving or facilitating administration, e.g. print management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1229—Printer resources management or printer maintenance, e.g. device status, power levels
- G06F3/1231—Device related settings, e.g. IP address, Name, Identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1285—Remote printer device, e.g. being remote from client or server
- G06F3/1286—Remote printer device, e.g. being remote from client or server via local network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1285—Remote printer device, e.g. being remote from client or server
- G06F3/1288—Remote printer device, e.g. being remote from client or server in client-server-printer device configuration
Definitions
- the present invention relates to a print service management apparatus, a print service system, and a non-transitory computer readable medium.
- a print service management apparatus including: a file receiving unit that receives a file to be registered sent from an information processing device; a management unit that registers the file received by the file receiving unit in a memory unit and manages the file; and a registration control unit that, when there is a possibility of fraudulent use of print service using the file received by the file receiving unit, controls registration so that a higher load than normal is imposed on a file registration operation by a user of the information processing device.
- FIG. 1 is a schematic configuration diagram illustrating a print service system according to a first exemplary embodiment of the invention
- FIG. 2 is a hardware configuration diagram of a print server in the first exemplary embodiment
- FIG. 3 is a diagram illustrating a block configuration of each of apparatuses included in the print service system in the first exemplary embodiment
- FIG. 4 is a table illustrating an example of data structure of fraudulent use keyword information to be stored in a fraudulent use keyword information memory in the first exemplary embodiment
- FIG. 5 is a flowchart illustrating file registration processing in the first exemplary embodiment
- FIG. 6 is a screen view illustrating an example of a user information input screen in the first exemplary embodiment
- FIG. 7 is a table illustrating an example of data structure of file management information to be stored in a file management information memory in the first exemplary embodiment
- FIG. 8 is a flowchart illustrating the processing performed at the time of printing a file in the first exemplary embodiment
- FIG. 9 is a screen view illustrating an example of a print screen in the first exemplary embodiment
- FIG. 10 is a diagram illustrating a block configuration of each of apparatuses included in a print service system in a second exemplary embodiment.
- FIG. 11 is a table illustrating an example of data structure of company information to be stored in a company information memory in the second exemplary embodiment.
- FIG. 1 is a schematic configuration diagram illustrating a first exemplary embodiment of a print service system according to the invention.
- FIG. 1 illustrates a user terminal 1 , a print server 2 as a print service management apparatus, and a printer 3 .
- the user terminal 1 is an information processing device such as a personal computer (PC) used by a user A in an office A.
- the printer 3 is installed in an office B of a user B, and is connected to the print server 2 via a network 4 to allow data communication.
- PC personal computer
- FIG. 2 is a hardware configuration diagram of the print server 2 in this exemplary embodiment.
- the print server 2 in this exemplary embodiment can be achieved by a general-purpose hardware configuration in related art.
- the print server 2 is configurated by a CPU 41 , a ROM 42 , a RAM 43 , a hard disk drive (HDD) 44 as a memory unit, a user interface 45 , and a network interface (IF) 46 provided as a communication unit which are connected to an internal bus 47 .
- the user interface 45 is configurated by, for instance, a mouse and a keyboard as serving an input unit, and a display serving as a display unit.
- the user terminal 1 is also the same type of computer as the print server 2 , thus the hardware configuration is shown as in FIG. 2 . It is sufficient that the printer 3 be equipped with a printing function, however, in this exemplary embodiment, a function of receiving a print ID specified by input from a user is necessary. Thus, it is assumed that an image forming apparatus such as a multifunction machine having an operation panel is used.
- the print server 2 issues a print ID.
- the print server 2 holds and manages the print ID and the file in association with each other.
- the user A informs the user B of the issued print ID in some way.
- the printer 3 obtains a file corresponding to the inputted print ID from the print server 2 , and prints the file.
- FIG. 3 is a diagram illustrating a block configuration of each of apparatuses included in the print service system illustrated in FIG. 1 . It is to be noted that any component not used for description of this exemplary embodiment is omitted in FIG. 3 .
- the user terminal 1 has a user interface (UI) unit 11 , and a file transmitter 12 .
- the UI unit 11 is a unit that displays various screens and receives an input operation of a user via the various screens, and has a registration requester 111 , and a display processor 112 in this exemplary embodiment.
- the registration requester 111 requests registration of the file in the print server 2 .
- the registration requester 111 obtains a print ID which is issued after a registration request is received, and stores the print ID in a predetermined region of the user terminal 1 , or causes the display processor 112 to display a screen.
- the display processor 112 displays a screen which is utilized when a file is registered.
- the display processor 112 transmits the file to be registered to the print server 2 .
- the components 11 , 12 in the user terminal 1 are implemented by a cooperative operation of a computer that serves as the user terminal 1 , and a program that is executed by a CPU mounted on the computer.
- the program is assumed to a Web application provided from the print server 2 .
- the program is not limited to a Web application.
- the print server 2 has a file receiver 21 , a keyword analyzer 22 , a file manager 23 , a registration controller 24 , a print request receiver 25 , a display controller 26 , a fraudulent use keyword information memory 51 , a file management information memory 52 , and a file memory 53 .
- the file receiver 21 receives a file to be registered, which is sent from the user terminal 1 .
- the fraudulent use keyword information memory 51 as described later in detail, one or multiple character strings (fraudulent use keywords), which may be written in a file for fraudulent use of print service, are registered.
- the keyword analyzer 22 analyzes whether or not a character string specified as a fraudulent use keyword is included in the file, and determines whether or not there is a possibility of fraudulent use of print service using the file.
- the file manager 23 serves as a management unit that registers a file received by the file receiver 21 in the file memory 53 and manages the file. In particular, in this exemplary embodiment, the file manager 23 controls permission of registration of a file, generation of file management information on the file, and file registration operation by a user in cooperation with the registration controller 24 according to a result of the analysis by the keyword analyzer 22 .
- the registration controller 24 serves as a registration control unit that, when there is a possibility of fraudulent use of print service using a file received by the file receiver 21 , controls registration so that a higher load than normal is imposed on file registration operation by a user of the user terminal 1 .
- the print request receiver 25 receives a print request sent from the printer 3 .
- the display controller 26 performs display control over the operation panel of the printer 3 . In particular, when a file to be printed specified in the print request received by the print request receiver 25 is managed in association with fraudulent use possibility information, the display controller 26 in this exemplary embodiment performs control to cause the printer 3 to display a message indicating that there is a possibility of fraudulent use of print service using the file.
- FIG. 4 is a table illustrating an example of data structure of fraudulent use keyword information to be stored in a fraudulent use keyword information memory 51 in this exemplary embodiment.
- the “fraudulent use keyword” refers to a character string which may be written in a file for fraudulent use of print service.
- the fraudulent use keyword information is defined as a triple of a category indicating a purpose of fraudulent use, a keyword which may be fraudulently used in the category, and a retrieval condition. A serial number is assigned to each triple. A method of utilizing the fraudulent use keyword information will be described along with description of the operation.
- the file memory 53 stores a file to be registered, which is transmitted from the user terminal 1 .
- the file management information memory 52 stores file management information for managing the files registered in the file memory 53 .
- the components 21 to 26 in the print server 2 are implemented by a cooperative operation of a computer that serves as the print server 2 , and a program that is executed by the CPU 41 mounted on the computer.
- the memories 51 to 53 are implemented in HDD 44 mounted on the print server 2 .
- the RAM 43 or an external memory unit may be utilized via a network.
- the printer 3 has a user interface (UI) unit 31 , a suspicious file notifier 32 , and a print processor 33 .
- the UI unit 31 is a unit that displays various screens and receives an input operation of a user via the various screens, and has a print requester 311 and a display processor 312 in this exemplary embodiment.
- the print requester 311 transmits a print request including a print ID to the print server 2 according to a print instruction in which the print ID is specified by a user.
- the display processor 312 displays a screen which is utilized at the time of printing.
- the suspicious file notifier 32 notifies the print server 2 of the determination.
- the print processor 33 performs print processing of a file obtained from the print server 2 .
- the components 31 to 33 in the printer 3 are implemented by a cooperative operation of a computer mounted on the printer 3 , and a program that is executed by a CPU mounted on the computer.
- the program is assumed to be a Web application provided from the print server 2 .
- the program is not limited to a Web application.
- the program used in this exemplary embodiment may be provided by a communication unit as well as by a computer readable recording medium, such as a USB memory, in which the program is stored.
- the program provided by a communication unit or a recording medium is installed in a computer, and various types of processing are achieved by the CPU of the computer that executes the program sequentially.
- a user who wishes to utilize the print service starts a registration application by performing a predetermined operation via the user terminal 1 .
- the registration requester 111 performs a registration operation under the control of the registration controller 24 , thereby requesting registration of a file to the print server 2 .
- the file transmitter 12 transmits the file to be registered to the print server 2 .
- the file receiver 21 in the print server 2 receives the file transmitted from the user terminal 1 (step S 101 ). Subsequently, the keyword analyzer 22 analyzes whether or not a character string (keyword) or a combination of character strings for the purpose of fraudulent use is included in the received file (step S 102 ). More specifically, the following analysis is performed.
- the keyword analyzer 22 extracts a keyword from the fraudulent use keyword information memory 51 per category.
- Each keyword is associated with “ANDn” (n is a positive integer) as a retrieval condition, and keywords with the same retrieval condition are connected by “or”, and keywords (group) with different retrieval conditions are connected by “and”.
- “AND1” is set as the retrieval condition for “signature” and “seal”
- “AND2” is set as the retrieval condition for “contract”, “covenant”, and “conclusion” out of the keywords belonging to the category of contract fraud.
- the following fraudulent use condition is formed: (“signature” or “seal”) and (“contract” or “covenant” or “conclusion”).
- the keyword analyzer 22 determines that there is a possibility of fraudulent use using the file. When the determination is negative, the keyword analyzer 22 similarly determines whether or not there is a possibility of fraudulent use for other categories.
- the file manager 23 causes the registration controller 24 to request a normal file registration operation in the same manner as before from a user, and proceeds to processing of issuing a new print ID.
- the file manager 23 causes the registration controller 24 to perform control to impose a higher load than normal on the file registration operation by a user.
- the file registration operation on which a higher load than normal is imposed refers to a burdensome operation for a user who performs the registration operation.
- an input screen for user information as illustrated in FIG. 6 is displayed on the user terminal 1 , and a user is prompted to input user information although such input of user information is not originally required.
- input of 400 characters or more is required for a utilization purpose.
- input of three items is required in the example of an input screen of FIG. 6 , for instance, input of many pieces of information, such as 30 items or more, may be required.
- the registration controller 24 controls registration so that a higher load than normal is imposed on the file registration operation of a user by requiring additional input of user information.
- a user who needs to register a file for business operations would continue to input user information till the end regardless of an increased load on the registration operation, however, a malicious user may give up registration of a file due to an increased load on the registration operation.
- the print server 2 receives user information inputted on the input screen (step S 104 ), however, when a user does not input user information (N in step S 105 ), the print server 2 discards the file received in step S 101 , and completes the registration processing (step S 111 ).
- the file manager 23 stores the inputted user information (step S 106 ).
- the user information is stored in the file management information memory 5 for the sake of convenience, however, a memory unit for storing the user information may be separately prepared.
- the file manager 23 issues a new print ID for the file as a reservation number for printing (step S 107 ), and generates file management information then stores the information in the file management information memory 52 (step S 108 ).
- the file manager 23 then registers the file in the file memory 53 (step S 109 ), and notifies the user terminal 1 of the issued print ID (step S 110 ).
- FIG. 7 is a table illustrating an example of data structure of file management information to be stored in the file management information memory 52 in this exemplary embodiment.
- the file management information is generated for each issued print ID. Specifically, in the file management information, a file name, a size, a sheet, a type, a user information number, disablement, and date/time of disablement are set in association with an issued print ID. In the file name, the size, the sheet, and the type, a name, a size, a document size, and a file type of a registered file are set, respectively. These pieces of information are identifiable by analyzing the file.
- the following user information number is identification information to associate with the user information received in step S 104 .
- the user information stored in step S 106 is assigned an identification number (user information number) to identify the user information, and the identification number is set to the user information number.
- the disablement is flag information that indicates whether or not printing of the file is disabled by a user who is going to print the file, and “1” is set to a disabled file in this exemplary embodiment. As an initial value, “0”, which indicates that a file is not disabled, is set to the disablement. A date/time, at which a file is disabled, is set to the date/time of disablement.
- the file management information illustrated in FIG. 7 it is possible to determine whether or not there is a possibility of fraudulent use of print service using the file by whether or not user information number is set.
- the user information number also serves as fraudulent use possibility information which indicates a possibility of fraudulent use of print service using the file, when inputted information is not stored like the user information, flag information may be managed as fraudulent use possibility information in association with the file.
- FIG. 4 illustrates a setting example of retrieval conditions in a combination of multiple keywords as the fraudulent use keyword information used for determination of a possibility of fraudulent use.
- examples of a load imposed on the registration operation such as input of user information, and an increased number of characters, have been exemplified.
- a load imposed on the registration operation may be associated with each category of fraudulent use, and a load associated with a category satisfying a fraudulent use condition in step S 103 may be imposed on a user.
- a category which is a purpose of fraudulent use of a file, may be identified based on, for instance, the frequency of appearance of each keyword included in the file, and it may be determined in step S 103 that a fraudulent use condition is satisfied for only the identified category.
- a file registrant of the file notifies a user who requests printing of a print ID issued from the print server 2 .
- the processing performed at the time of printing a file will be described with reference to the flowchart illustrated in FIG. 8 .
- a user who wishes to print a file starts up a printing application by performing a predetermined operation via the operation panel of the printer 3 .
- the print requester 311 requests printing to the print server 2 by transmitting a print ID. That is, the print requester 311 requests transmission of a file to be printed.
- the file manager 23 refers to the file management information memory 52 , and identifies file management information corresponding to the received print ID (step S 122 ). It is checked whether or not fraudulent use possibility information (user information number for file management information exemplified in FIG. 7 ) is set to the identified file management information.
- the file manager 23 determines that there is no possibility of fraudulent use using the file, and the print request receiver 25 retrieves a file corresponding to the transmitted print ID from the file memory 53 in the same manner as before, then transmits the file to the printer 3 , thereby causing the print processor 33 in the printer 3 to execute printing (step S 128 ).
- the display controller 26 causes the printer 3 to display a print screen for calling attention exemplified in FIG. 9 (step S 124 ).
- the print screen includes a message 91 indicating that there is a possibility of fraudulent use of print service using the file, and the message 91 calls attention to the printing executor.
- user information 92 is further displayed as a message.
- the printing executor can check a file registrant.
- the printing executor can select a print button 93 , a suspicious button 94 , or a cancel button 95 on the print screen.
- An operation of one of buttons 93 to 95 by the print executor gives an instruction for a file with a possibility of fraudulent use.
- the instruction by a user is sent to the print server 2 , and the print request receiver 25 receives the instruction (step S 125 ).
- the print request receiver 25 retrieves a file corresponding to the print ID from the file memory 53 in the same manner as before, then transmits the file to the printer 3 , thereby causing the print processor 33 in the printer 3 to execute printing (step S 128 ).
- the print executor when printing is desired to be avoided, the print executor only have to select the cancel button 95 . However, when the print executor feels that the file is suspicious in consideration of the content of a message displayed on the screen, the print executor may select the suspicious button 94 rather than select the cancel button 95 just to avoid printing. Although the print executor should be familiar with the user information, if a registrant name is different or a utilization purpose notified by the registrant is different from a utilization purpose displayed on the screen, the print executor may feel that the file is suspicious.
- the file manager 23 sets “1” to the disablement in corresponding file management information according to the operation instruction to disable the file, and sets the date/time of disablement (step S 129 ). In this manner, in the file management information, information on the file, for which printing is disabled by the disablement is recorded. Once a file is disabled, then it is no longer possible to print the file by not only a user who has disabled the file, but also other users.
- the registrant may be photographed by operating the photographing unit.
- imaging data may be obtained as the information related to the file registrant.
- the position of the registrant may be obtained by operating the positioning unit.
- position information may be obtained as the information related to the file registrant.
- a file registration operation can be performed with a normal load.
- FIG. 10 is a diagram illustrating a block configuration of each of apparatuses included in the print service system in this exemplary embodiment.
- the same components as in the first exemplary embodiment are labeled with the same symbol, and a description is omitted.
- the print server 2 in this exemplary embodiment has a configuration in which a company information memory 54 is added to the configuration shown in the first exemplary embodiment.
- FIG. 11 is a table illustrating an example of data structure of company information to be stored in the company information memory 54 in this exemplary embodiment.
- company information a company name as the information that identifies a company is set in association with a terminal name used in the company, and the IP address of the terminal.
- the user terminal 1 utilized for file registration is set by a reliable company for which it is guaranteed that print service is not fraudulently used due to a contract or the like. In other words, since the user terminal 1 presented by a reliable company, it is indirectly guaranteed that there is no possibility of fraudulent use of print service using the file registered via the user terminal 1 .
- step S 103 in FIG. 5 the file registration processing in this exemplary embodiment will be described, and basically is the same as in the first exemplary embodiment except that when a fraudulent use condition is satisfied, the following processing is added in step S 103 in FIG. 5 .
- the registration controller 24 checks the IP address of the user terminal 1 , which is the transmission source of the file. The registration controller 24 then obtains company information from the company information memory 54 , and when the IP address of the user terminal 1 is registered in the company information, the registration controller 24 proceeds to the processing of issuing a print ID without proceeding to the processing of inputting user information (step S 107 ). When the IP address of the user terminal 1 serving as the transmission source of the file is not registered in the company information, similarly to the first exemplary embodiment, the registration controller 24 proceeds to the processing of inputting user information (step S 104 ).
- the IP address of the user terminal 1 for which no fraudulent use is guaranteed, is presented by a company, thus in this exemplary embodiment, for the sake of management of information, the IP address is set and registered in the company information as guarantee information in association with the company. However, a company name is unnecessary for determination of the presence of guarantee, thus only the IP address may be set and registered. Also, in this exemplary embodiment, the presence of guarantee of no fraudulent use is determined by the IP address that identifies the user terminal 1 , but may be determined by a user. Specifically, identification information (such as a user ID) of a user, for whom no fraudulent use is guaranteed, may be provided by a company, and may be set and registered in the company information as the guarantee information.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
Description
- This application is based on and claims priority under 35 USC 119 from Japanese Patent Application No. 2017-118294 filed on Jun. 16, 2017.
- The present invention relates to a print service management apparatus, a print service system, and a non-transitory computer readable medium.
- According to an aspect of the invention, there is provided a print service management apparatus including: a file receiving unit that receives a file to be registered sent from an information processing device; a management unit that registers the file received by the file receiving unit in a memory unit and manages the file; and a registration control unit that, when there is a possibility of fraudulent use of print service using the file received by the file receiving unit, controls registration so that a higher load than normal is imposed on a file registration operation by a user of the information processing device.
- Exemplary embodiments of the present invention will be described in detail based on the following figures, wherein:
-
FIG. 1 is a schematic configuration diagram illustrating a print service system according to a first exemplary embodiment of the invention; -
FIG. 2 is a hardware configuration diagram of a print server in the first exemplary embodiment; -
FIG. 3 is a diagram illustrating a block configuration of each of apparatuses included in the print service system in the first exemplary embodiment; -
FIG. 4 is a table illustrating an example of data structure of fraudulent use keyword information to be stored in a fraudulent use keyword information memory in the first exemplary embodiment; -
FIG. 5 is a flowchart illustrating file registration processing in the first exemplary embodiment; -
FIG. 6 is a screen view illustrating an example of a user information input screen in the first exemplary embodiment; -
FIG. 7 is a table illustrating an example of data structure of file management information to be stored in a file management information memory in the first exemplary embodiment; -
FIG. 8 is a flowchart illustrating the processing performed at the time of printing a file in the first exemplary embodiment; -
FIG. 9 is a screen view illustrating an example of a print screen in the first exemplary embodiment; -
FIG. 10 is a diagram illustrating a block configuration of each of apparatuses included in a print service system in a second exemplary embodiment; and -
FIG. 11 is a table illustrating an example of data structure of company information to be stored in a company information memory in the second exemplary embodiment. - Hereinafter, exemplary embodiments of the invention will be described with reference to the drawings.
-
FIG. 1 is a schematic configuration diagram illustrating a first exemplary embodiment of a print service system according to the invention.FIG. 1 illustrates auser terminal 1, aprint server 2 as a print service management apparatus, and aprinter 3. Theuser terminal 1 is an information processing device such as a personal computer (PC) used by a user A in an office A. Theprinter 3 is installed in an office B of a user B, and is connected to theprint server 2 via anetwork 4 to allow data communication. -
FIG. 2 is a hardware configuration diagram of theprint server 2 in this exemplary embodiment. Theprint server 2 in this exemplary embodiment can be achieved by a general-purpose hardware configuration in related art. Specifically, as illustrated inFIG. 2 , theprint server 2 is configurated by aCPU 41, aROM 42, aRAM 43, a hard disk drive (HDD) 44 as a memory unit, auser interface 45, and a network interface (IF) 46 provided as a communication unit which are connected to aninternal bus 47. Theuser interface 45 is configurated by, for instance, a mouse and a keyboard as serving an input unit, and a display serving as a display unit. - The
user terminal 1 is also the same type of computer as theprint server 2, thus the hardware configuration is shown as inFIG. 2 . It is sufficient that theprinter 3 be equipped with a printing function, however, in this exemplary embodiment, a function of receiving a print ID specified by input from a user is necessary. Thus, it is assumed that an image forming apparatus such as a multifunction machine having an operation panel is used. - Although
multiple user terminals 1 andprinters 3 may be provided, it is sufficient that both deliver the processing capability described below, thus oneuser terminal 1 and oneprinter 3 are illustrated for the sake of convenience inFIG. 1 . - An overview of the flow of service processing provided by the print service system having the above configuration will be described below. When the user A registers a file in the
print server 2, theprint server 2 issues a print ID. Theprint server 2 holds and manages the print ID and the file in association with each other. The user A informs the user B of the issued print ID in some way. When the user B inputs the print ID to theprinter 3, theprinter 3 obtains a file corresponding to the inputted print ID from theprint server 2, and prints the file. -
FIG. 3 is a diagram illustrating a block configuration of each of apparatuses included in the print service system illustrated inFIG. 1 . It is to be noted that any component not used for description of this exemplary embodiment is omitted inFIG. 3 . - The
user terminal 1 has a user interface (UI)unit 11, and afile transmitter 12. TheUI unit 11 is a unit that displays various screens and receives an input operation of a user via the various screens, and has aregistration requester 111, and adisplay processor 112 in this exemplary embodiment. In response to an input operation of a user who wishes to register a file in theprint server 2, the registration requester 111 requests registration of the file in theprint server 2. In addition, theregistration requester 111 obtains a print ID which is issued after a registration request is received, and stores the print ID in a predetermined region of theuser terminal 1, or causes thedisplay processor 112 to display a screen. Thedisplay processor 112 displays a screen which is utilized when a file is registered. Thedisplay processor 112 transmits the file to be registered to theprint server 2. - The
components user terminal 1 are implemented by a cooperative operation of a computer that serves as theuser terminal 1, and a program that is executed by a CPU mounted on the computer. In the first exemplary embodiment, the program is assumed to a Web application provided from theprint server 2. However, the program is not limited to a Web application. - The
print server 2 has afile receiver 21, akeyword analyzer 22, afile manager 23, aregistration controller 24, aprint request receiver 25, adisplay controller 26, a fraudulent usekeyword information memory 51, a filemanagement information memory 52, and afile memory 53. Thefile receiver 21 receives a file to be registered, which is sent from theuser terminal 1. In the fraudulent usekeyword information memory 51, as described later in detail, one or multiple character strings (fraudulent use keywords), which may be written in a file for fraudulent use of print service, are registered. Thekeyword analyzer 22 analyzes whether or not a character string specified as a fraudulent use keyword is included in the file, and determines whether or not there is a possibility of fraudulent use of print service using the file. Thefile manager 23 serves as a management unit that registers a file received by thefile receiver 21 in thefile memory 53 and manages the file. In particular, in this exemplary embodiment, thefile manager 23 controls permission of registration of a file, generation of file management information on the file, and file registration operation by a user in cooperation with theregistration controller 24 according to a result of the analysis by thekeyword analyzer 22. - The
registration controller 24 serves as a registration control unit that, when there is a possibility of fraudulent use of print service using a file received by thefile receiver 21, controls registration so that a higher load than normal is imposed on file registration operation by a user of theuser terminal 1. Theprint request receiver 25 receives a print request sent from theprinter 3. Thedisplay controller 26 performs display control over the operation panel of theprinter 3. In particular, when a file to be printed specified in the print request received by theprint request receiver 25 is managed in association with fraudulent use possibility information, thedisplay controller 26 in this exemplary embodiment performs control to cause theprinter 3 to display a message indicating that there is a possibility of fraudulent use of print service using the file. -
FIG. 4 is a table illustrating an example of data structure of fraudulent use keyword information to be stored in a fraudulent usekeyword information memory 51 in this exemplary embodiment. The “fraudulent use keyword” refers to a character string which may be written in a file for fraudulent use of print service. The fraudulent use keyword information is defined as a triple of a category indicating a purpose of fraudulent use, a keyword which may be fraudulently used in the category, and a retrieval condition. A serial number is assigned to each triple. A method of utilizing the fraudulent use keyword information will be described along with description of the operation. - The
file memory 53 stores a file to be registered, which is transmitted from theuser terminal 1. The filemanagement information memory 52 stores file management information for managing the files registered in thefile memory 53. - The
components 21 to 26 in theprint server 2 are implemented by a cooperative operation of a computer that serves as theprint server 2, and a program that is executed by theCPU 41 mounted on the computer. Thememories 51 to 53 are implemented inHDD 44 mounted on theprint server 2. Alternatively, theRAM 43 or an external memory unit may be utilized via a network. - The
printer 3 has a user interface (UI)unit 31, asuspicious file notifier 32, and aprint processor 33. TheUI unit 31 is a unit that displays various screens and receives an input operation of a user via the various screens, and has aprint requester 311 and adisplay processor 312 in this exemplary embodiment. The print requester 311 transmits a print request including a print ID to theprint server 2 according to a print instruction in which the print ID is specified by a user. Thedisplay processor 312 displays a screen which is utilized at the time of printing. When a user who is going to print a file determines that the file to be printed is suspicious, thesuspicious file notifier 32 notifies theprint server 2 of the determination. Theprint processor 33 performs print processing of a file obtained from theprint server 2. - The
components 31 to 33 in theprinter 3 are implemented by a cooperative operation of a computer mounted on theprinter 3, and a program that is executed by a CPU mounted on the computer. In the first exemplary embodiment, the program is assumed to be a Web application provided from theprint server 2. However, the program is not limited to a Web application. - Also, the program used in this exemplary embodiment may be provided by a communication unit as well as by a computer readable recording medium, such as a USB memory, in which the program is stored. The program provided by a communication unit or a recording medium is installed in a computer, and various types of processing are achieved by the CPU of the computer that executes the program sequentially.
- Next, the operation in this exemplary embodiment will be described. As described above, in order for a user to utilize the print service, a file has to be registered in the
print server 2. First, the file registration processing will be described with reference to the flowchart illustrated inFIG. 5 . - A user who wishes to utilize the print service starts a registration application by performing a predetermined operation via the
user terminal 1. Thus, theregistration requester 111 performs a registration operation under the control of theregistration controller 24, thereby requesting registration of a file to theprint server 2. At this point, thefile transmitter 12 transmits the file to be registered to theprint server 2. - The
file receiver 21 in theprint server 2 receives the file transmitted from the user terminal 1 (step S101). Subsequently, thekeyword analyzer 22 analyzes whether or not a character string (keyword) or a combination of character strings for the purpose of fraudulent use is included in the received file (step S102). More specifically, the following analysis is performed. - The
keyword analyzer 22 extracts a keyword from the fraudulent usekeyword information memory 51 per category. Each keyword is associated with “ANDn” (n is a positive integer) as a retrieval condition, and keywords with the same retrieval condition are connected by “or”, and keywords (group) with different retrieval conditions are connected by “and”. For instance, “AND1” is set as the retrieval condition for “signature” and “seal”, and “AND2” is set as the retrieval condition for “contract”, “covenant”, and “conclusion” out of the keywords belonging to the category of contract fraud. In this case, the following fraudulent use condition is formed: (“signature” or “seal”) and (“contract” or “covenant” or “conclusion”). In other words, when a file includes at least one of keywords “signature”, and “seal”, and at least one of keywords “contract”, “covenant”, and “conclusion”, thekeyword analyzer 22 determines that there is a possibility of fraudulent use using the file. When the determination is negative, thekeyword analyzer 22 similarly determines whether or not there is a possibility of fraudulent use for other categories. - When the
keyword analyzer 22 determines that there is no possibility of fraudulent use for all categories, that is, when the file received by thefile receiver 21 does not satisfy any fraudulent use condition (N in step S103), thefile manager 23 causes theregistration controller 24 to request a normal file registration operation in the same manner as before from a user, and proceeds to processing of issuing a new print ID. - On the other hand, when the
keyword analyzer 22 determines that there is a possibility of fraudulent use for at least one of the categories, that is, when the file satisfies a fraudulent use condition (Y in step S103), thefile manager 23 causes theregistration controller 24 to perform control to impose a higher load than normal on the file registration operation by a user. The file registration operation on which a higher load than normal is imposed refers to a burdensome operation for a user who performs the registration operation. - For instance, an input screen for user information as illustrated in
FIG. 6 is displayed on theuser terminal 1, and a user is prompted to input user information although such input of user information is not originally required. In addition, input of 400 characters or more is required for a utilization purpose. Although input of three items is required in the example of an input screen ofFIG. 6 , for instance, input of many pieces of information, such as 30 items or more, may be required. - In this manner, when there is a possibility of fraudulent use using the file to be registered, the
registration controller 24 controls registration so that a higher load than normal is imposed on the file registration operation of a user by requiring additional input of user information. A user who needs to register a file for business operations would continue to input user information till the end regardless of an increased load on the registration operation, however, a malicious user may give up registration of a file due to an increased load on the registration operation. - In this manner, the
print server 2 receives user information inputted on the input screen (step S104), however, when a user does not input user information (N in step S105), theprint server 2 discards the file received in step S101, and completes the registration processing (step S111). - When a user inputs user information (Y in step S105), the
file manager 23 stores the inputted user information (step S106). In this exemplary embodiment, the user information is stored in the filemanagement information memory 5 for the sake of convenience, however, a memory unit for storing the user information may be separately prepared. - Subsequently, in the same manner as in the case where it is determined that there is no possibility of fraudulent use using the file received by the
file receiver 21, thefile manager 23 issues a new print ID for the file as a reservation number for printing (step S107), and generates file management information then stores the information in the file management information memory 52 (step S108). Thefile manager 23 then registers the file in the file memory 53 (step S109), and notifies theuser terminal 1 of the issued print ID (step S110). -
FIG. 7 is a table illustrating an example of data structure of file management information to be stored in the filemanagement information memory 52 in this exemplary embodiment. The file management information is generated for each issued print ID. Specifically, in the file management information, a file name, a size, a sheet, a type, a user information number, disablement, and date/time of disablement are set in association with an issued print ID. In the file name, the size, the sheet, and the type, a name, a size, a document size, and a file type of a registered file are set, respectively. These pieces of information are identifiable by analyzing the file. The following user information number is identification information to associate with the user information received in step S104. It is to be noted that the user information stored in step S106 is assigned an identification number (user information number) to identify the user information, and the identification number is set to the user information number. The disablement is flag information that indicates whether or not printing of the file is disabled by a user who is going to print the file, and “1” is set to a disabled file in this exemplary embodiment. As an initial value, “0”, which indicates that a file is not disabled, is set to the disablement. A date/time, at which a file is disabled, is set to the date/time of disablement. - It is to be noted that in this exemplary embodiment, as an example of file registration operation on which a higher load than normal is imposed, input of user information, and input with an increased number of characters or an increased number of items have been described. However, without being limited to this, for instance, the number of operations for making transitions between screens may be increased by providing a greater number of screens for the registration operation. Alternatively, in order to reduce responsiveness, a response speed after an item value is inputted may be decreased. In this manner, a load may be imposed on a user by increasing the time taken for the registration operation.
- In the file management information illustrated in
FIG. 7 , it is possible to determine whether or not there is a possibility of fraudulent use of print service using the file by whether or not user information number is set. In other words, although the user information number also serves as fraudulent use possibility information which indicates a possibility of fraudulent use of print service using the file, when inputted information is not stored like the user information, flag information may be managed as fraudulent use possibility information in association with the file. - It is to be noted that
FIG. 4 illustrates a setting example of retrieval conditions in a combination of multiple keywords as the fraudulent use keyword information used for determination of a possibility of fraudulent use. However, without necessarily combining keywords, even when a file includes one keyword, it may be determined that there is a possibility of fraudulent use. In this exemplary embodiment, examples of a load imposed on the registration operation, such as input of user information, and an increased number of characters, have been exemplified. However, for instance, a load imposed on the registration operation may be associated with each category of fraudulent use, and a load associated with a category satisfying a fraudulent use condition in step S103 may be imposed on a user. - Although keywords are pre-set for each category in this exemplary embodiment, without pre-classifying the keywords into categories, a category, which is a purpose of fraudulent use of a file, may be identified based on, for instance, the frequency of appearance of each keyword included in the file, and it may be determined in step S103 that a fraudulent use condition is satisfied for only the identified category.
- When a file can be registered in the
print server 2 in this manner, a file registrant of the file notifies a user who requests printing of a print ID issued from theprint server 2. Hereinafter, the processing performed at the time of printing a file will be described with reference to the flowchart illustrated inFIG. 8 . - A user (hereinafter referred to a “printing executor”) who wishes to print a file starts up a printing application by performing a predetermined operation via the operation panel of the
printer 3. When a print ID is inputted on a predetermined print screen by a printing executor, the print requester 311 requests printing to theprint server 2 by transmitting a print ID. That is, the print requester 311 requests transmission of a file to be printed. - When the
print request receiver 25 in theprint server 2 receives a print ID transmitted from the printer 3 (step S121), thefile manager 23 refers to the filemanagement information memory 52, and identifies file management information corresponding to the received print ID (step S122). It is checked whether or not fraudulent use possibility information (user information number for file management information exemplified inFIG. 7 ) is set to the identified file management information. When a user information number is not set (N in step S123), thefile manager 23 determines that there is no possibility of fraudulent use using the file, and theprint request receiver 25 retrieves a file corresponding to the transmitted print ID from thefile memory 53 in the same manner as before, then transmits the file to theprinter 3, thereby causing theprint processor 33 in theprinter 3 to execute printing (step S128). - On the other hand, when fraudulent use possibility information is set to the identified file management information (Y in step S123), the
display controller 26 causes theprinter 3 to display a print screen for calling attention exemplified inFIG. 9 (step S124). The print screen includes amessage 91 indicating that there is a possibility of fraudulent use of print service using the file, and themessage 91 calls attention to the printing executor. In addition, when user information is used as fraudulent use possibility information,user information 92 is further displayed as a message. Thus, the printing executor can check a file registrant. Although there is no guarantee that a user (file registrant) who is going to fraudulently use print service inputs correct user information, it is possible to call attention to the printing executor at least. - The printing executor can select a
print button 93, asuspicious button 94, or a cancelbutton 95 on the print screen. An operation of one ofbuttons 93 to 95 by the print executor gives an instruction for a file with a possibility of fraudulent use. The instruction by a user is sent to theprint server 2, and theprint request receiver 25 receives the instruction (step S125). When the instruction indicates print, that is, when the print executor selects the print button 93 (N in step S127, Y in step S126), theprint request receiver 25 retrieves a file corresponding to the print ID from thefile memory 53 in the same manner as before, then transmits the file to theprinter 3, thereby causing theprint processor 33 in theprinter 3 to execute printing (step S128). - When the instruction indicates cancel, that is, when the print executor selects the cancel button 95 (N in step S127, N in step S126), printing is cancelled. In this case, the operation panel in the
printer 3 returns to the initial screen, and nothing is performed in theprint server 2. - Like this, when printing is desired to be avoided, the print executor only have to select the cancel
button 95. However, when the print executor feels that the file is suspicious in consideration of the content of a message displayed on the screen, the print executor may select thesuspicious button 94 rather than select the cancelbutton 95 just to avoid printing. Although the print executor should be familiar with the user information, if a registrant name is different or a utilization purpose notified by the registrant is different from a utilization purpose displayed on the screen, the print executor may feel that the file is suspicious. - When a user selects the suspicious button 94 (Y in step S126), the
file manager 23 sets “1” to the disablement in corresponding file management information according to the operation instruction to disable the file, and sets the date/time of disablement (step S129). In this manner, in the file management information, information on the file, for which printing is disabled by the disablement is recorded. Once a file is disabled, then it is no longer possible to print the file by not only a user who has disabled the file, but also other users. - As described above, according to this exemplary embodiment, when there is a possibility of fraudulent use of print service, a higher load than normal is imposed on the file registration operation, and burden is thereby placed on the registrant, and occurrence of fraudulent use of print service can be reduced. Also, it is possible to call attention to the printing executor.
- It is to be noted that in order to facilitate tracking of a user (file registrant) with a possibility of fraudulent use, when there is a possibility of fraudulent use of print service, information related to the file registrant may be additionally obtained.
- For instance, when a photographing unit (camera) is mounted on the
user terminal 1 and it is determined that there is a possibility of fraudulent use of print service, the registrant may be photographed by operating the photographing unit. In other words, imaging data may be obtained as the information related to the file registrant. - Alternatively, when a positioning unit (GPS) is mounted on the
user terminal 1 and it is determined that there is a possibility of fraudulent use of print service, the position of the registrant may be obtained by operating the positioning unit. In other words, position information may be obtained as the information related to the file registrant. - In the first exemplary embodiment, when there is a possibility of fraudulent use of print service with a file, a higher load than normal is imposed on the file registration operation by a user, and burden is thereby placed on the registrant. However, even if it seems that there is a possibility of fraudulent use of print service because a keyword which presumably indicates fraudulent use of print service is included in a file, when there is no possibility of fraudulent use of print service due to guaranteed identity of the registrant, it may be not necessary to impose a higher load than normal on the file registration operation.
- Thus, in this exemplary embodiment, when the identity of the registrant is guaranteed, a file registration operation can be performed with a normal load.
-
FIG. 10 is a diagram illustrating a block configuration of each of apparatuses included in the print service system in this exemplary embodiment. The same components as in the first exemplary embodiment are labeled with the same symbol, and a description is omitted. Theprint server 2 in this exemplary embodiment has a configuration in which acompany information memory 54 is added to the configuration shown in the first exemplary embodiment. -
FIG. 11 is a table illustrating an example of data structure of company information to be stored in thecompany information memory 54 in this exemplary embodiment. In the company information, a company name as the information that identifies a company is set in association with a terminal name used in the company, and the IP address of the terminal. In the company information, theuser terminal 1 utilized for file registration is set by a reliable company for which it is guaranteed that print service is not fraudulently used due to a contract or the like. In other words, since theuser terminal 1 presented by a reliable company, it is indirectly guaranteed that there is no possibility of fraudulent use of print service using the file registered via theuser terminal 1. - Hereinafter, the file registration processing in this exemplary embodiment will be described, and basically is the same as in the first exemplary embodiment except that when a fraudulent use condition is satisfied, the following processing is added in step S103 in
FIG. 5 . - Specifically, when the file satisfies a fraudulent use condition (Y in step S103), the
registration controller 24 checks the IP address of theuser terminal 1, which is the transmission source of the file. Theregistration controller 24 then obtains company information from thecompany information memory 54, and when the IP address of theuser terminal 1 is registered in the company information, theregistration controller 24 proceeds to the processing of issuing a print ID without proceeding to the processing of inputting user information (step S107). When the IP address of theuser terminal 1 serving as the transmission source of the file is not registered in the company information, similarly to the first exemplary embodiment, theregistration controller 24 proceeds to the processing of inputting user information (step S104). - According to this exemplary embodiment, even when the file includes a keyword which presumably indicates fraudulent use of print service, when the identity of a registrant is guaranteed, it is possible to allow the registrant to perform a normal file registration operation.
- The IP address of the
user terminal 1, for which no fraudulent use is guaranteed, is presented by a company, thus in this exemplary embodiment, for the sake of management of information, the IP address is set and registered in the company information as guarantee information in association with the company. However, a company name is unnecessary for determination of the presence of guarantee, thus only the IP address may be set and registered. Also, in this exemplary embodiment, the presence of guarantee of no fraudulent use is determined by the IP address that identifies theuser terminal 1, but may be determined by a user. Specifically, identification information (such as a user ID) of a user, for whom no fraudulent use is guaranteed, may be provided by a company, and may be set and registered in the company information as the guarantee information. - The foregoing description of the exemplary embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to practitioners skilled in the art. The embodiments were chosen and described in order to best explain the principles of the invention and its practical applications, thereby enabling others skilled in the art to understand the invention for various embodiments and with the various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the following claims and their equivalents.
Claims (17)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JPJP2017-118294 | 2017-06-16 | ||
JP2017118294A JP2019003458A (en) | 2017-06-16 | 2017-06-16 | Print service management device, print service system and program |
JP2017-118294 | 2017-06-16 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20180364955A1 true US20180364955A1 (en) | 2018-12-20 |
US10983736B2 US10983736B2 (en) | 2021-04-20 |
Family
ID=64657439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/996,012 Active 2038-11-26 US10983736B2 (en) | 2017-06-16 | 2018-06-01 | Print service management apparatus, print service system, and non-transitory computer readable medium for addressing possibility of fraudulent use of print service |
Country Status (2)
Country | Link |
---|---|
US (1) | US10983736B2 (en) |
JP (1) | JP2019003458A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040239974A1 (en) * | 2003-03-12 | 2004-12-02 | Yasuhiko Uchida | Print job creation apparatus, job management apparatus, and print job management system including print job creation apparatus and job management apparatus |
US20130091002A1 (en) * | 2011-10-05 | 2013-04-11 | News America Marketing Properties, LLC. | System and method for coupon validation |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001094590A (en) | 1999-09-21 | 2001-04-06 | Canon Inc | Server and system for document distribution |
JP2005267002A (en) | 2004-03-17 | 2005-09-29 | Ricoh Co Ltd | Print service system, compound machine, program, and storage medium |
JP2006236250A (en) * | 2005-02-28 | 2006-09-07 | Ntt Communications Kk | Server device and content transmission method |
JP2006268303A (en) * | 2005-03-23 | 2006-10-05 | Nomura Research Institute Ltd | Contributed data evaluation system |
JP2010136141A (en) | 2008-12-05 | 2010-06-17 | Ricoh Co Ltd | Document processing system and document processing method |
JP2011022737A (en) | 2009-07-15 | 2011-02-03 | Hitachi Ltd | Transfer control method using automatic teller machine |
JP6114329B2 (en) * | 2015-03-20 | 2017-04-12 | ヤフー株式会社 | Advertiser evaluation apparatus, advertiser evaluation method, and advertiser evaluation program |
-
2017
- 2017-06-16 JP JP2017118294A patent/JP2019003458A/en active Pending
-
2018
- 2018-06-01 US US15/996,012 patent/US10983736B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040239974A1 (en) * | 2003-03-12 | 2004-12-02 | Yasuhiko Uchida | Print job creation apparatus, job management apparatus, and print job management system including print job creation apparatus and job management apparatus |
US20130091002A1 (en) * | 2011-10-05 | 2013-04-11 | News America Marketing Properties, LLC. | System and method for coupon validation |
Also Published As
Publication number | Publication date |
---|---|
US10983736B2 (en) | 2021-04-20 |
JP2019003458A (en) | 2019-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9065939B2 (en) | Printing management system using correspondence between user identification information of an information system and user identification information of a printing system | |
US9436423B2 (en) | Cloud printing system permits unauthorized user to use MFP without exceeding constraints set for correlated quest account | |
US20190050244A1 (en) | Server apparatus, image forming apparatus, information processing apparatus, image forming control method, and image forming control program | |
US8472041B2 (en) | Information processing apparatus, information processing system and computer-readable storage medium performing first authentication when storing print data and performing second authentication when printing stored print data | |
US10664205B2 (en) | Image processing apparatus transmitting registration request including incapability information indicating that any setting is incapable of being designated | |
US9965228B2 (en) | Information processing system, information processing method and non-transitory computer readable information recording medium | |
US8964228B2 (en) | Printing system, printing method, information processing apparatus, and non-transitory computer readable medium | |
US20120246248A1 (en) | Image Forming Apparatus that Transmits/Receives an Electronic Mail Related to Image Formation, Image Forming Method, and Recording Medium | |
US9300648B2 (en) | Image processing apparatus and image processing system | |
US8503006B2 (en) | Job managing apparatus performing process of passing printed material to recipient | |
US20170070640A1 (en) | Information processing system, information processing apparatus, and apparatus | |
US9477434B2 (en) | Image forming apparatus, job execution system, and job execution method | |
US9137230B2 (en) | Information processing apparatus, communication system, and computer-readable medium | |
US9710200B2 (en) | Adaptive job execution apparatus for executing a job with a plurality of alternative sets of executing conditions, job execution method, and computer-readable storage medium for computer program | |
US20150268911A1 (en) | Image forming system and image forming device | |
US11611677B2 (en) | Information processing apparatus that identifies related document images based on metadata and associates them based on user input, information processing system, information processing method, and storage medium | |
US11431716B2 (en) | Information processing apparatus and non-transitory computer readable medium | |
US20160255221A1 (en) | Apparatus, information processing system, information processing method, and computer program product | |
US10983736B2 (en) | Print service management apparatus, print service system, and non-transitory computer readable medium for addressing possibility of fraudulent use of print service | |
US11481166B2 (en) | Information processing system, information processing apparatus for controlling access to resources and functions for managing users allowed to access the resources | |
US10404880B2 (en) | Image forming device, image forming method, and non-transitory computer-readable medium | |
US10708462B1 (en) | Communication support device and non-transitory computer readable medium | |
US20160085487A1 (en) | Document processing system, non-transitory computer readable medium, document processing apparatus, and document processing method | |
US20190258441A1 (en) | Communication Device, Non-Transitory Computer-Readable Recording Medium Storing Computer-Readable Instructions for Communication Device, and Method Performed by Communication Device | |
JP2016110446A (en) | Gui control system, gui control method, program for gui control system, and computer-readable recording medium recorded with program for gui system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUJI XEROX CO., LTD., JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AOKI, MASANORI;REEL/FRAME:045964/0858 Effective date: 20171013 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCT | Information on status: administrative procedure adjustment |
Free format text: PROSECUTION SUSPENDED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: AWAITING TC RESP., ISSUE FEE NOT PAID |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: FUJIFILM BUSINESS INNOVATION CORP., JAPAN Free format text: CHANGE OF NAME;ASSIGNOR:FUJI XEROX CO., LTD.;REEL/FRAME:061374/0122 Effective date: 20210401 |